Skip to main content

MC-PKS: A Collaboration Public Key Services System for Mobile Applications

  • Conference paper
  • First Online:
Proceedings of the 9th International Conference on Computer Engineering and Networks

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1143))

  • 1117 Accesses

Abstract

Digital certificates provided by PKI are commonly used for identification and authentication services. The corresponding private key can be protected by USB keys, TEE/SE, etc., in the hardware environment. But in the software environment, the private key is relatively easy for an attacker to steal. This paper presents the design and implementation of a collaboration public key services system for mobile applications, which is named MC-PKS. The MC-PKS system provides a set of mobile digital certificate signatures and decryption schemes for PKI in the form of APP-server collaboration. It protects the private key utilizing information hiding and secret splitting on two-party signature schemes, which ensures that the split private key which has been split can still generate a digital signature if and only if with the cooperation of the server. We then analyze the security of the proposed system and show that it satisfies all known security requirements in practical applications. The performance analysis demonstrates that the MC-PKS system also achieves the resource-constrained requirements of mobile applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Buchmann, J.A., Karatsiolis, E., Wiesmaier, A.: Introduction to public key infrastructures (2013)

    Google Scholar 

  2. Rivest, R., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(2), 96–99 (1978)

    MathSciNet  MATH  Google Scholar 

  3. CNNIC: Public key cryptographic algorithm SM2. https://cnnic.com.cn/ScientificResearch/LeadingEdge/soea/SM2/201312/t20131204_43349.htm. Last Accessed 21 July 2019

  4. Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ecdsa). Int. J. Inf. Secur. 1(1), 36–63 (2001)

    Article  Google Scholar 

  5. Harn, L.: Comments on ‘fair (t, n) threshold secret sharing scheme’. IET Inf. Secur. 8(6), 303–304 (2014)

    Article  Google Scholar 

  6. Harn, L., Fuyou, M.: Multilevel threshold secret sharing based on the chinese remainder theorem. Inf. Process. Lett. 114(9), 504–509 (2014)

    Article  MathSciNet  Google Scholar 

  7. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  8. Kumar, R., Verma, H. K.: An advanced secure (t, n) threshold proxy signature scheme based on rsa cryptosystem for known signers. In: IEEE 2nd International Advance Computing Conference (IACC). pp. 293–298 (2010)

    Google Scholar 

  9. Muxiang, Y., Fan, H., Minghui, Z., Jun, L.: Efficient and robust two-party rsa key generation. Wuhan Univ. J. Nat. Sci. 11(6), 1617–1620 (2006)

    Article  MathSciNet  Google Scholar 

  10. Xiong, H., Li, F., Qin, Z.: Certificateless threshold signature secure in the standard model. Inf. Sci. 237, 73–81 (2013)

    Article  MathSciNet  Google Scholar 

  11. Rabin, M.O.: How to exchange secrets with oblivious transfer. IACR Cryptol. ePrint Arch. 2005, 187 (2005)

    Google Scholar 

  12. Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164 (1982)

    Google Scholar 

  13. Wu, L., Wang, J., Choo, K.R., He, D.: Secure key agreement and key protection for mobile device user authentication. IEEE Trans. Inf. Forensics Secur. 14(2), 319–330 (2019)

    Article  Google Scholar 

  14. Ma, C.S., Zheng G.: RSA cloud signature generation method (CN Patent 108923911A 2018)

    Google Scholar 

  15. Merkle, R.C.: Secure communications over insecure channels. Commun. ACM 21(4), 294–299 (1978)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Nos. 61572028, 61672243), the National Cryptography Development Fund (No. MMJJ20180206), the National Science Foundation of Guangdong Province (No. 2019A1515011797) and the Project of Science and Technology of Guangzhou (201802010044), the State Scholarship Fund of China Scholarship Council (CSC) (Grant No. 201808440097), and the Research Team of Big Data Audit from Guangdong University of Finance and Economics.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yamin Wen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sun, T., Chen, S., Huang, J., Wen, Y., Ma, C., Gong, Z. (2021). MC-PKS: A Collaboration Public Key Services System for Mobile Applications. In: Liu, Q., Liu, X., Li, L., Zhou, H., Zhao, HH. (eds) Proceedings of the 9th International Conference on Computer Engineering and Networks . Advances in Intelligent Systems and Computing, vol 1143. Springer, Singapore. https://doi.org/10.1007/978-981-15-3753-0_66

Download citation

Publish with us

Policies and ethics